The Advantages of Trusted Virtual Platforms

Size: px
Start display at page:

Download "The Advantages of Trusted Virtual Platforms"

Transcription

1 Trusted Virtual Platforms: A Key Enabler for Converged Client Devices Chris I Dalton, David Plaquin, Wolfgang Weidner, Dirk Kuhlmann, Boris Balacheff, Richard Brown HP Laboratories, Filton Road, Bristol BS34 8QZ {firstname.lastname}@hp.com ABSTRACT This paper introduces our work around combining machine virtualization technology with Trusted Computing Group technology. We first describe our architecture for reducing and containing the privileged code of the Xen Hypervisor. Secondly we describe our Trusted Virtual Platform architecture. This is aimed at supporting the strong enforcement of integrity and security policy controls over a virtual entity where a virtual entity can be either a full guest operating system or virtual appliance running on a virtualized platform. The architecture includes a virtualization-specific integrity measurement and reporting framework. This is designed to reflect all the dependencies of the virtual environment of a guest operating system. The work is a core enabling component of our research around converged devices client platforms such as notebooks or desktop PCs that can safely host multiple virtual operating systems and virtual appliances concurrently and report accurately on the trustworthiness of the individually executing entities. Keywords Trusted Virtualization, Open Trusted Computing, TPM, TCG 1. INTRODUCTION Machine virtualization allows a single physical machine to run several (perhaps different) operating systems concurrently; it creates the illusion of multiple machines each running its own operating system. Machine virtualization technology has seen significant industry momentum and uptake in areas such as server consolidation, utility computing, and dynamic provisioning of test and development environments. The industry momentum behind machine virtualization has also started to create exciting opportunities for enhanced secure system and infrastructure design. A traditional weakness with current computing platforms that run an operating system directly above the machine bare metal hardware is that we have no choice other than to trust that operating system as the security gatekeeper on the platform 1. 1 With the increasing size and complexity of commodity operating systems this is probably not a good idea. McConnell [4] reports an industry average of about errors per 1000 lines of delivered code, although not all errors will be sufficiently exploitable to allow security control bypass. Microsoft Vista is estimated to have around 50 million lines of code compared to the 40 million of the earlier Windows XP and million of the earlier NT 4.0. Architecturally, machine virtualization places a component called a Virtual Machine Monitor (VMM) or Hypervisor between the OS and the bare machine hardware. The VMM is used to carve up a physical machine into multiple virtual machines, each running its own operating system 2. The VMM gives us a new point where we can introduce OS-independent security controls. In principal, the VMM can be a fairly small and tight code base with much less of an attack surface than a typical OS, making the VMM a more reasonable placeholder for our trust. In practice though, the most popular implementations of VMM layers have, to date, focused primarily on functionality and usability rather than security and trustworthiness. The first part of this paper looks at our attempt to redress that balance. In particular we look at our efforts around reducing and re-structuring the privileged control plane of the Xen Hypervisor [1], where we describe an architectural approach for splitting up the control plane of Xen into a number of contained and partitioned services sitting above a core management interface. We focus on the control plane because that aspect currently contains the majority of the privileged code forming the Xen Hypervisor. Minimizing and containing the privileged code is important since this is what gives us confidence in the ability of the VMM to uphold its isolation guarantees for guest operating systems. As an example of a partitioned service using our architecture we describe a virtualized GPU and Secure GUI service. This service sits outside the core privileged management interface and offers guest operating systems access to underlying hardware acceleration and 3D features for graphics and a user interface for securely managing interactions with virtual machines on the system. Our general philosophy on secure systems design revolves around two key points. First, reducing the amount and complexity of code that you have to trust to uphold your security properties or guarantees is a good idea. Our work around reducing and restructuring the Xen control plane fits into this category. Second, anchoring your trust and security properties in hardware is a good idea too. In the second part of the paper we focus on that aspect where we look at combining machine virtualization technology with Trusted Computing Group technology [7][10]. The Trusted Computing Group is a cross-it-industry consortium formed in 2003 by founding members that include AMD, HP, IBM, Intel and Microsoft. The main output of the group so far is 2 This is commonly referred to as a guest operating system or simply a guest.

2 the Trusted Platform Module (TPM) 3 specification. The TPM is a small hardware chip that is bound to the motherboard of a computing platform. It provides a starting point for gaining trust in that platform in a cryptographically strong fashion, and is designed to be immune from software attacks on the platform. The TPM chip offers three main functionalities: It provides cryptographic identities for a platform; it provides mechanisms for creating a protective store on the platform for sensitive data such as encryption keys; and finally, it provides a cryptographically verifiable report on integrity measurements of the software components running on a platform. When used with a conventional non-virtualized platform the TPM can, amongst other things, be used to ensure that a platform boots with an OS version and configuration that is considered trustworthy 4. Essentially, the TPM contains a number of protected Platform Configuration Registers or PCRs. The PCRs are used to record cryptographic hashes (known as integrity measurements) of the platform software components such as device expansion ROMs and the operating system boot loader as they are loaded and begin to execute. The hashes or measurements recorded in the TPM can be compared against policies also held in the TPM that dictate the conditions under which sensitive data such as encryption keys protected using the protective store features of the TPM can be released. The Microsoft Bitlocker[6] full-disk encryption solution makes use of this aspect of the TPM to ensure that the encryption key for the hard disk is released only if the measurements of various aspects of the system configuration such as the boot loader and OS version match the stored TPM policy. This helps to ensure that an attacker can t bypass OS security controls and gain access to the platform hard disk data by booting a platform via removable media such as a CD or USB stick containing an alternative OS. The TPM specification sets out a base TPM integrity measurement architecture. This prescribes a way of building up a chain of trust in the platform so that when interacting with a particular application on a platform, a report can be obtained on the software components that were executed on the platform in order to get that application up and running 5, and upon which that application depends. This report is a list of PCR configuration values cryptographically signed and certified in such a way that it can be verified that the measurements were obtained by a genuine TPM sitting on a physical platform that meets the requirements of the TCG specifications. Remote parties, for example an online banking service, can use this report to establish the trustworthiness of a particular user s client platform 6 before allowing it access to a service. Our work aimed at using the TPM in combination with machine virtualization technology takes advantage of the base TPM integrity measurement architecture, but it also extends it to make 3 TPMs ship on a large volume of motherboards from the leading PC manufacturers. 4 This is known as secure boot. An alternative where measurements of the boot components are taken but the machine is still allowed to boot regardless of those measurements is more common and known as authenticated boot. 5 Such as the BIOS, the boot loader and the operating system sitting under the application. 6 For example, that the integrity of the client platform s boot loader hadn t been compromised by a virus. it more appropriate for virtualized environments. As a starting point we use the conventional TPM features to ensure that we can establish whether a physical platform has booted with a virtualization layer that can be trusted for example, Xen with our reduced and restructured control plane in an approved configuration. An operating system running within a virtual machine environment depends not only upon the integrity and correctness of the virtual machine hardware interface provided to it by the VMM, but also on the integrity of the various components that sit behind that interface for example, the components providing emulated device models 7 for that particular virtual machine. The extended integrity measurement architecture that we describe in the second part of the paper allows us to capture all of these dependencies in a convenient and manageable fashion to describe what we call a Trusted Virtual Platform. A Trusted Virtual Platform groups together all the components that form a virtual machine environment and upon which a virtualized OS or appliance depends. As part of its implementation the Trusted Virtual Platform includes a virtual TPM for use by a guest OS. This allows the trustworthiness of a particular virtual entity (guest OS or virtual appliance) to be reported independently from other virtual entities running on the same platform. Our work here differs from existing work [2] on providing virtual TPMs for guest operating systems in that we have extended the existing TPM measurement architecture so that we can more accurately capture all of the dependencies of a virtual environment. We believe that the traditional TPM measurement architecture with its strictly hierarchical nature cannot capture all the dependencies of virtualized systems with enough detail to accurately reflect and report on the trustworthiness of a particular virtualized instance. Additionally, the Trusted Virtual Platform concept allows the management of integrity and security controls for a particular guest OS to be abstracted away from the overall virtualization layer management software and hence more easily and reliably managed. For example, the definition of a Trusted Virtual Platform configuration for a particular guest OS can include a set of firewall rules that should be applied to that virtualized OS irrespective of whether that virtualized OS itself hosts its own firewalling capability. Components within the Trusted Virtual Platform interpose on all security-related lifecycle actions for a virtual machine hosting a particular guest OS and act as an enforcement point for the defined policies. Trusted Virtual Platforms are the core enabling component of our research around converged devices client platforms such as notebooks or desktop PCs that can safely host multiple virtualized operating systems and virtual appliances concurrently and report accurately on the trustworthiness of the individually executing entities (Figure 1). We note that our work is largely applicable to the server side too but we have concentrated on the client side as this creates interesting user experience and performance 7 Such as network or video card emulation code.

3 challenges 8 that so far have not been adequately addressed by the research community. The rest of the paper proceeds as follows: We start by giving some brief motivating examples for our pursuit of the Trusted Virtual Platform concept and highlight the key requirements that we are attempting to satisfy with our work. Then in the first of the two main sections of the paper we describe our work around restructuring the Xen control plane based on our core management interface and service architecture. In the second we describe our Trusted Virtual Platform concept and our extended integrity measurement architecture. We finish with a survey of related work and some concluding remarks hinting at areas of future work. Figure 1: Trusted Converged Client Much of the work described here has been done within the context of the European FP6 Open Trusted Computing (Open_TC) project and we thank our colleagues in that project for their collaboration. In particular we would like to acknowledge the work carried out by Carsten Weinhold whilst on placement in HP Labs from the Technical University of Dresden, Operating System Research Group. 2. USE SCENARIOS AND REQUIREMENTS At a high level we can take two different views on an IT system to capture requirements and illustrate the motivations for our work in pursuing the Trusted Virtual Platform concept. Starting with an end-user view of an IT system, typically users want to know that they are using the application they expect to be using and to be confident that that application is operating free from interference. They may also want to run applications of differing trust levels safely on a single platform; for example, more and more of our daily lives rely on access to online services such as those provided by financial institutions. This makes it increasingly likely that a successful attack via untrustworthy software on a user s platform will result in access to sensitive or valuable information or assets that a user would rather have protected. The need for convenient 8 For example, how to allow access to modern machine capability such as hardware accelerated graphics in a safe and trustworthy fashion. containment environments for a user s applications is therefore also increasing. IT operations, on the other hand, are looking for robust and effective means of easing the burden and difficulty of enforcing organizational security policy. In the cases where the boundary of an organization begins to stretch, such as where an organization makes provision for mobile and home working, organizations have a need to be able to determine the trust and security properties of an end-point device remotely before allowing it access to corporate resources. At a top level, IT operations are looking for strong assurance that their business IT systems are functioning when and as required. The Trusted Virtual Platform concept can help from both of these viewpoints. From a user s perspective, the Trusted Virtual Platform concept gives a user the capability to run multiple applications of differing trust levels, say banking and gaming, on the same machine. It provides strongly isolated execution environments and the integrity and security of a properties of particular contained execution environment can be demonstrated to, say, an online bank where required. This brings benefits from an IT operations view too. We are increasingly seeing a blurring of the line between work and social lives with an associated increase in the shared use of IT resources for both business and personal activities. Just as the user can be assured that the business applications on their system cannot interfere with their personal applications and data, IT operations can be assured that their business applications and data can be hosted on an end user s platform safely isolated from anything else the end user may have (perhaps inadvertently) introduced onto their platform. Even without the explicit need to support shared use of a platform for business and personal use, the Trusted Virtual Platform has value for an IT organization. As a simple example, end point computing platforms in use within an organization are commonly required to run some sort of personal firewall in order for the overall organization security policy to be upheld and enforced. In that model, the IT operations are quite sensitive to what else is running on an endpoint platform and are dependent upon the endpoint platform OS working as expected and not being under the control of an attacker, for example. This is hard to guarantee for a general-purpose endpoint platform OS such as Microsoft Vista or Linux. Using the Trusted Virtual Platform concept, the main endpoint platform OS can be run on one Trusted Virtual Platform, while security functionality such as a personal firewall can be run isolated away from the main OS on another Trusted Virtual Platform on the same physical machine. Underlying virtualization controls can be used to ensure that all network traffic from the main OS is routed through that firewall before it is allowed out onto the physical network. With this model, IT operations need only to be assured about the firewall Trusted Virtual Platform and underlying virtualization components; the network firewall controls will be applied no matter what state the main user OS is in and whether it is under the control of an attacker or not. The job of providing ongoing assurances about the overall health and well-being of the business IT systems can be eased greatly if certain assumptions like these about the end point platforms can be made and verified in a remote fashion. From the scenarios painted above we can begin to extract some general requirements needed to support our Trusted Virtual Platform concept. Clearly, robust isolation of concurrent execution environments at the whole system level is required. The ability to apply mandatory policy controls over the contained

4 execution environments is also required, such as the mentioned ability to dictate that network traffic from one virtualized operating system should be routed via another one before the traffic is allowed out onto the physical network. Finally, it needs to be possible for a remote party to establish the trust and security properties of a particular endpoint device in a meaningful fashion before granting access to sensitive or valuable resources. existing tools and applications for installing, configuring and managing the system. However, general-purpose operating systems have a large code base and potential attack surface. The challenge here is maintaining a balance between management convenience, management application support, performance and a minimal set of privileged code on the system. 3. TRUSTED VIRTUALIZATION LAYER In this section we describe our work towards improving the trustworthiness of the Xen Hypervisor. We first describe our control plane disaggregation architecture. The aim of this is to partition and reduce the amount of privileged code forming Xen. This is based on splitting up the control plane normally provided by the Domain 0 operating system of Xen into a number of partitioned services. We then describe our library OS work which is a useful toolkit for hosting partitioned control plane services. Finally, we show how we can provide a high-performance disaggregated display virtualization service for our guest VMs with a secure GUI for managing trustworthy interactions with those VMs. 3.1 General Approach Our approach is pretty simple in theory namely, reduce the size and complexity of the code you have to trust in order for the isolation guaranties to be upheld. In practice things are a little more difficult. The first step in reducing the amount of privileged or trusted code on a system is establishing exactly where that code resides. On Xen, virtual machines are known as domains. Guest operating systems run within a domain. Domain 0 is a privileged domain and is used to manage IO and the other domains on the system. The operating system running within domain 0 is known as the control-plane OS. A simplified representation of the Xen Hypervisor is shown in Figure 2. Here we can see four virtual machines running: Domain 0 which is hosting the control plane OS (typically a Linux distribution of some form), two normal guest OSes and another VM hosting a virtual appliance guest OS. A virtual appliance is simply a self-contained OS and application bundle. The circled boxes in Figure 2 attempt to show that in order for isolation guarantees for guests to be upheld, we are trusting not only the core hypervisor layer (bottom circled box) but also the management and control plane OS running in Domain 0 (top left circle). For the purposes of this report we concentrate on the top left circle of the figure Control Plane Restructuring Creating a trusted virtualization layer is a challenge because typically VMM layers require their control plane functionality to be hosted by a privileged VM running a general purpose OS such as Linux. This is Domain 0 under Xen. The control plane is normally structured in this fashion so as to enable the use of 9 We have also carried out work in reducing the amount of code at the based VMM level by prototyping a modular VMM where only the actual functionality required is loaded. Figure 2: The Xen Hypervisor The restructuring of the privileged Xen management and control plane we call disaggregation where essentially we identify the security critical features of the platform and move them into separate and smaller restricted privilege domains. Two good examples of such a restructuring include the development of a privileged Domain Builder VM (Domain B) [5] and a graphics domain (see section 2.3). These are two critical services provided by the platform and form part of the overall Trusted Computing Base (TCB). The TCB is what you rely on to uphold your security guarantees or properties. Our key contribution here is the architecture and development of a core privileged basic management engine that provides an appropriate interface (BMSI or Basic Management and Security Interface) for running lessprivileged disaggregated management / control components on top of it (Figure 3). Example functionality provided by the BMSI interface includes the ability to create a new VM and manage its lifecycle. The interface also allows access to basic physical TPM functionality, such as the protective store features of the TPM so that sensitive data and keys used by a service can be protected by the hardware TPM. 3.3 Library OS To support the restructuring of control plane functionality into separately partitioned services we have developed what we call a library OS. The library OS gives us the ability to run an application program directly on top of Xen without requiring a full-blown OS underneath the application. Using the library OS instead of say a Linux-based OS to host an application reduces the amount of code being trusted by a factor of (from 1 10M lines of code to 100K lines of code). The library OS is made up of a cross-development environment and a set of libraries. The library OS allows C language application programs to be developed that will run directly on Xen. Figure 4 shows the application interfaces. The support for applications under our library OS is limited to the functions

5 available in the LibC and LibGloss libraries, although we have recently added C++ library support as well as enhancing the MiniOS core so that it can better support the hosting of device drivers. As an example we have prototyped a MiniOS based Ethernet driver. A port of existing C or C++ code to the library OS environment would require adding support for any libraries used by that application. component layered over the Xen shared memory mechanisms (Uring in Figure 4). Figure 5: Library OS tool chain Figure 3: Restructured Xen Control Plane Underneath these libraries sits a minimized kernel based on the Xen MiniOS example that forms part of the Xen distribution. We have also added an inter-domain communication mechanism for communication between library OS-hosted apps and apps in other guest operating systems. The application, library and kernel all run in a single address space within a single protection ring (ring 1 in the x86 version of Xen) so there is no distinction between kernel and library code. This is an appropriate choice for running small trusted services, but not general user code. Figure 4: Xen Library OS As well as C library support we also provide a development tool chain for actually building applications. The development tool chain is GNU-based allowing applications to be compiled for either Linux or library OS target environments from the same source code (Figure 5). Servers built using the library OS need to be able to communicate with other domains. Conventional operating systems run as guests in Xen domains already have well-developed networking support, so it is possible to use protocols such as TCP/IP over virtual network interfaces for inter-domain communications. For the small servers we expect to run over the library OS a full TCP/IP protocol stack adds unnecessary code size and complexity. Instead, we use the existing interface provided by Xen to implement inter-domain communications as a library 3.4 Display Virtualization Service The standard model for providing guest operating systems with graphical services under Xen is based on sharing the real physical machine video card via an X server running within Domain 0. Domain 0 accesses the real video card hardware directly; guest desktops are accessed from Domain 0 using either a VNC or SDL window hosted within the Domain 0 X server. Whilst this is a convenient method of accessing the guest desktops it has two major drawbacks. First, the graphics performance and capability of desktops running over X server connections, whilst adequate for some server applications, is generally inadequate for client-side devices where high-performance and 3D graphical output is increasingly expected by end users. Research prototypes have started to appear that offer 3D capability for Xen guests[3] but support is limited to OpenGL primitives. The Aero graphical interface of Microsoft Vista is based on Direct X. Direct X cannot be directly mapped to OpenGL primitives so another approach is needed in order to support Vista. Second, an X server is typically a large body of complex code. It is not ideal for this code to be hosted within the Domain 0 privileged VM. A compromise would give an attacker a pathway into accessing the privileged interface of Domain 0. This next section looks at the work we have done in three areas: First, a more secure method of providing shared graphical services for guests (outside of Domain 0). Second, how to support the hardware acceleration and 3D interfaces required of the latest generation Microsoft operating systems. Third, we describe aspects of a GUI for securely managing user interactions with guest operating systems Graphics Disaggregation Newer Intel and AMD hardware platforms 10 offer an IOMMU capability alongside the well-established CPU MMU capability. With an IOMMU, a PCI card such as a graphics card can be securely directly assigned to a guest virtual machine 11. The guest 10 Intel Montevino/Cantiga for example. 11 There are technical challenges in particular with pass-through graphics cards largely due to the need to support VBIOS operation. We have satisfactorily addressed those challenges on the HP 6930p notebook and DC7800 desktop platforms.

6 runs the real device drivers for the pass-through card and all the card functionality such as GPU hardware acceleration and 3D effects are available to it. The IOMMU is given a set of page tables that map the device s view of memory pages (guest pages) to actual physical pages (machine pages). In this way it is possible to limit the ability of a rogue guest OS being able to use the DMA capabilities of a pass-through device to compromise the system as a whole (such as overwriting the Xen memory area or reading another guest s memory area). In itself, an IOMMU doesn t allow a single hardware device to be shared 12 but does give us an important foundation on which to build. Figure 7 shows the non-virtualized Gallium architecture. Gallium achieves portability across hardware GPUs and different OS interfaces for graphics (DirectX and OpenGL) by providing at a top level an abstract GPU instruction set that gallium components lower down in the stack map onto the real GPU instruction set. We add virtualization to the Gallium stack above its abstract GPU instruction set interface. Figure 7: Gallium 3D Driver Architecture Figure 6: Simple Graphics Disaggregation Figure 6 shows an initial first-step towards graphics display disaggregation. Here a separate domain (Domain G) hosts a virtual frame buffer mapping component. The physical machine video card is directly mapped to Domain G using an IOMMU. Other guests are provided with a virtual frame buffer device which simply forwards all the frame buffer reads and writes to the mapping service within Domain G. Domain G multiplexes the virtual guest frame buffers onto the real graphics device. This provides a simple graphics service for guests that doesn t rely on guests accessing the real graphics hardware through an X server in Domain GPU Virtualization To support more than a simple virtualized frame buffer interface and offer guests access to hardware acceleration and 3D GPU features we have virtualized the Gallium 13 driver framework [8]. Gallium is a new architecture for providing 3D graphics drivers which is designed to be OS- and graphics hardware-independent. 12 PCI-IOV [9] devices do help with this but IOV graphic cards are still somewhere off. 13 Gallium is the driver architecture adopted by Intel for their Open Source graphics drivers. Figure 8: Virtualized Gallium 3D Architecture The key part of our virtualized Gallium stack is a virtualized Gallium driver head the component shown in Figure 8 as hosting multiple backends. This is responsible for initializing the real Gallium driver, assigning defined screen regions and buffers to guests, and responding to init requests from guests (screen size or graphics mode for example). It also acts as a dispatcher that connects and disconnects specific guest command streams to and from the real driver. By plugging the virtualized gallium stack into our disaggregated graphics domain we can safely provide guests with access to the hardware acceleration and 3D GPU features of the physical graphics card Secure GUI service The virtualized Gallium driver architecture gives us additional functionality such as the ability to do command stream filtering and translation. It also allows compositing such as the transparent layering of guest windows (alpha blending). With this support we can provide a secure GUI for both allowing guest windows to safely share a single screen area and to provide Guest VM graphical management functionality such as the ability to query VM states, start and stop VMs, or grab / filter input events, for

7 example. Other features include the potential for guest window labeling (e.g. to indicate security states). 4. TRUSTED VIRTUAL PLATFORM Under a VMM or hypervisor-based system, a guest OS runs on top of what is traditionally referred to as a virtual platform (Figure 9). A virtual platform is composed of a set of virtual devices (such as virtual CPU, memory, disks, network, video, etc.) interconnected according to a specific layout and accessed by a guest OS running on top of a Virtual Machine (VM) interface. The layout and the security configuration of each virtual device are what define the identity and integrity of a virtual platform. To ease the burden associated with managing the security lifecycle of a guest OS running on a virtualized system, it is important that the integrity of its virtual platform is maintained and the desired security properties enforced, and this is where we introduce the notion of a trusted virtual platform (or TVP). A TVP is a virtual platform where we can guarantee and report on the integrity and security properties of that virtual platform. One aim of our trusted virtual platform concept is to achieve the same level of binding between virtual platform components that there is on a physical platform. To support the notion of a TVP we provide a Virtual Platform Enforcement Service (VPES) to interpose on the normal VM lifecycle management actions. When a request for a new VM is initiated by the management system, the VPES creates two additional VMs that are attached to the original VM (Figure 10). One VM is the Virtual Device Protection Service which is responsible for enforcing information flow policies for communications to and from the Virtual Platform. The second one is a Virtual TPM which is used to identify the Virtual Platform. It can also be used by the VM itself to enforce some intra-os security policies, just as a conventional physical TPM could be used by a non-virtualized operating system. devices. Under the latest versions of Xen, all device model code for a particular HVM domain is hosted within a stub-domain 14. This is the DM component in Figure 10. In our TVP model, the VDPS service verifies the integrity of that DM domain before allowing the guest operating system to begin execution. 5. INTEGRITY MEASUREMENT AND REPORTING ARCHITECTURE The virtualization-specific integrity measurement and reporting architecture described in this section makes it possible for the trust and security properties that we achieve at the trusted virtualization layer and the trusted virtual platform level to be attested 15 to and remotely verified. It is an important requirement for us that the integrity and reporting architecture manages to capture all the dependencies of a guest operating system. The core of this integrity and reporting framework is the hardware TPM. The TPM allows us to root the trust and security properties of our trusted virtualization layer in hardware. Hardware-based trust and security mechanisms offer immunity from the wide class of software-based attacks. The TPM thus provides a good foundation for the overall system trust and security properties. The disaggregation of the VMM control plane described in Section 3 reduces the amount of trusted code on the system, giving a reduced set of components we need to measure and report on, allowing for more meaningful verification. Generally, the smaller the component you can measure the better. This is based on the assumption that if you are measuring a sufficiently small component then you can have more confidence in its predicted behavior compared to a larger component. Figure 10: Trusted Virtual Platform Components Figure 9: Virtual Platform Architecture The VPES, VDPS and VTPMs interact together through the Basic Management and Security Interface (BMSI) as introduced in 3.2. This interface provides a minimal set of security and integrity primitives required to bootstrap each security service and implement the runtime integrity model of the Virtual Platforms. For Xen fully-virtualized (HVM) guest operating systems the majority of the hardware devices seen by that guest operating system are provided by emulated device models of real hardware Using TCG terminology [10], we build a chain of trust from the hardware TPM to our Trusted Virtualization Layer 16. The basic management and security interface (BMSI) of Section 3 exposes primitive TPM functionality for use by other platform services. 14 Stub-domains are almost identical to our Library OS. 15 This is the TCG term for the process of vouching for the accuracy of information. A TPM attests to the contents of its PCR registers. 16 On our latest platforms we use Intel TXT and AMD SVM dynamic root of trust mechanisms to get our virtualization layer up and running in a measured state.

8 The component implementing the BMSI is included as part of the trusted virtualization layer measurements, as this component is designed to encapsulate most of the core privileged code on the system above the actual VMM layer. We augment the trusted virtualization layer measurements with measurement of the Virtual Platform Enforcement Service (VPES), the component described in Section 4 that we use to interpose on all the VM lifecycle management operations as part of the Trusted Virtual Platform concept. This forms the basis of our static chain of trust, which is used to report on the integrity of the dynamic components and configuration that make up the virtual platforms. Reporting of integrity measurements to a remote party during its interaction with an application in a guest OS happens in much the same way as on a non-virtualized platform: a chain of trust in the (virtual) platform is built up so that when interacting with a particular application on a (virtual) platform, a report can be obtained about the components on the (virtual) platform. The remote party, for example an online banking service, can use this report to establish the trustworthiness of a particular user s client (virtual) platform before allowing it access to a service. However, in the case of a virtual platform, the integrity report needs to capture all of the dependencies of the virtual platform, i.e., its underlying components such as the VMM (Trusted Virtualization Layer). The model we present allows this report to be conveyed to a third party in two ways. With one method, the VM can make use of its Virtual TPM (in the same standard way it would use a hardware TPM) to obtain a digital signature of its current integrity. Because of the way the VTPM is implemented (using the Virtual Device Protection Service), such a signature will contain an implicit attestation of the current integrity of the TCB as well as the integrity of the Virtual Platform (its device configuration). An alternative method requires a special type of device (also implemented by using the VDPS) which responds to a remote party as part of a specific protocol before data is allowed to pass in and out of a virtual platform. This could be implemented as part of the Virtual Platform network device. The enhanced network device would implement an attestation response and establish an encrypted channel with the remote party before the guest OS is granted network access. With such a solution the guest OS doesn t need to be aware of or involved in the protocol for the attestation, which is useful in supporting legacy applications. Figure 11: Measurement and Reporting Framework An important aspect of the integrity and measurement framework is that it allows peer as well as strict hierarchical relationships between components to be captured via integrity measurements. For example, in Figure 11 the main VM of a virtual platform (component 5) depends on components 1, 2 and 4 even though from a virtualization layer perspective they are all peers. Following the traditional TCG measurement framework the relationship between component 5 and the others could not be captured. 6. RELATED WORK Berger et al [2] present the concept of a Virtual TPM. We believe their current implementation doesn t sufficiently capture the state of all the dependencies of a guest OS. Disaggregation of the Xen domain builder is discussed in [5]. Our BMSI architecture presents a more abstracted approach to disaggregation. 7. SUMMARY This paper has described our architecture for enforcing integrity and security policy controls over a guest operating system or virtual appliance running on top of a virtual platform using our Trusted Virtualization Layer and Trusted Virtual Platform concepts. The architecture also allows for attestation and remote verification of the virtualized platform trust and security properties via our virtualization-specific integrity measurement and reporting architecture. The measurement architecture is designed to reflect all the dependencies of the virtual environment of a guest operating system. This allows remote parties to accurately gain confidence in the (virtual) clients with which they are interacting. 8. REFERENCES [1] Barham, P., et al Xen and the Art of Virtualization. Proc. 19th ACM Symp. operating systems Principles (SOSP 03), pp [2] Berger, S., et al vtpm: virtualizing the trusted platform module. USENIX Security Symposium. pp [3] Lagar-Cavilla, H.A., VMM-independent graphics acceleration. ACM/Usenix International Conference On Virtual Execution Environments. pp [4] McConnell, Steve Code Complete. Microsoft Press. [5] Murray, D Improving Xen security through disaggregation. Proceedings of the Fourth ACM SIGPLAN/SIGOPS international conference on Virtual Execution Environments. [6] Microsoft. Microsoft Bitlocker Drive Encryption. [7] Trusted Computing Group. [8] Tungsten Graphics. Gallium 3D [9] PCI-SIG Specifications. PCI-SIG IO Virtualization. [10] Balacheff, B., et al Trusted Computing Platforms. Prentice Hall, 2002.

Full and Para Virtualization

Full and Para Virtualization Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels

More information

UNCLASSIFIED Version 1.0 May 2012

UNCLASSIFIED Version 1.0 May 2012 Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice

More information

COS 318: Operating Systems. Virtual Machine Monitors

COS 318: Operating Systems. Virtual Machine Monitors COS 318: Operating Systems Virtual Machine Monitors Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Introduction u Have

More information

Windows Server Virtualization & The Windows Hypervisor

Windows Server Virtualization & The Windows Hypervisor Windows Server Virtualization & The Windows Hypervisor Brandon Baker Lead Security Engineer Windows Kernel Team Microsoft Corporation Agenda - Windows Server Virtualization (WSV) Why a hypervisor? Quick

More information

vtpm: Virtualizing the Trusted Platform Module

vtpm: Virtualizing the Trusted Platform Module Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA vtpm: Virtualizing the

More information

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed

More information

Trusted Virtual Datacenter Radically simplified security management

Trusted Virtual Datacenter Radically simplified security management IBM T. J. Watson Research Center Trusted Virtual Datacenter Radically simplified security management Stefan Berger, Ramón Cáceres, Dimitrios Pendarakis, Reiner Sailer, Ray Valdez Secure Systems Department,

More information

Before we can talk about virtualization security, we need to delineate the differences between the

Before we can talk about virtualization security, we need to delineate the differences between the 1 Before we can talk about virtualization security, we need to delineate the differences between the terms virtualization and cloud. Virtualization, at its core, is the ability to emulate hardware via

More information

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

Microkernels, virtualization, exokernels. Tutorial 1 CSC469 Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,

More information

Patterns for Secure Boot and Secure Storage in Computer Systems

Patterns for Secure Boot and Secure Storage in Computer Systems Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de

More information

Building Blocks Towards a Trustworthy NFV Infrastructure

Building Blocks Towards a Trustworthy NFV Infrastructure Building Blocks Towards a Trustworthy NFV Infrastructure IRTF NFVRG Adrian L. Shaw Hewlett-Packard Laboratories / July 22 nd, 2015 1 Why security and trust? Big requirement for critical

More information

Introduction to Virtual Machines

Introduction to Virtual Machines Introduction to Virtual Machines Introduction Abstraction and interfaces Virtualization Computer system architecture Process virtual machines System virtual machines 1 Abstraction Mechanism to manage complexity

More information

Virtualization. Types of Interfaces

Virtualization. Types of Interfaces Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity

More information

The XenServer Product Family:

The XenServer Product Family: The XenServer Product Family: A XenSource TM White Paper Virtualization Choice for Every Server: The Next Generation of Server Virtualization The business case for virtualization is based on an industry-wide

More information

Virtualization Technologies (ENCS 691K Chapter 3)

Virtualization Technologies (ENCS 691K Chapter 3) Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing

More information

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits: Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique

More information

Virtualization. Jukka K. Nurminen 23.9.2015

Virtualization. Jukka K. Nurminen 23.9.2015 Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,

More information

Virtualization. Dr. Yingwu Zhu

Virtualization. Dr. Yingwu Zhu Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the

More information

How to Secure Infrastructure Clouds with Trusted Computing Technologies

How to Secure Infrastructure Clouds with Trusted Computing Technologies How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.

More information

Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution

Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution 1 Lecture Embedded System Security Dynamic Root of Trust and Execution Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2014 Dynamic Root

More information

SECURITY IN OPEN SOURCE VIRTUALIZATION

SECURITY IN OPEN SOURCE VIRTUALIZATION SECURITY IN OPEN SOURCE VIRTUALIZATION S.SELVAKUMAR B.Tech., IFET College of Engineering, - selvakkumarit@gmail.com ABSTRACT: As virtual machines become increasingly commonplace as a method of separating

More information

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16 Virtualization P. A. Wilsey The text highlighted in green in these slides contain external hyperlinks. 1 / 16 Conventional System Viewed as Layers This illustration is a common presentation of the application/operating

More information

Virtualization: Concepts, Applications, and Performance Modeling

Virtualization: Concepts, Applications, and Performance Modeling Virtualization: Concepts, s, and Performance Modeling Daniel A. Menascé, Ph.D. The Volgenau School of Information Technology and Engineering Department of Computer Science George Mason University www.cs.gmu.edu/faculty/menasce.html

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Hypervisors and Virtual Machines

Hypervisors and Virtual Machines Hypervisors and Virtual Machines Implementation Insights on the x86 Architecture DON REVELLE Don is a performance engineer and Linux systems/kernel programmer, specializing in high-volume UNIX, Web, virtualization,

More information

Hardware Based Virtualization Technologies. Elsie Wahlig elsie.wahlig@amd.com Platform Software Architect

Hardware Based Virtualization Technologies. Elsie Wahlig elsie.wahlig@amd.com Platform Software Architect Hardware Based Virtualization Technologies Elsie Wahlig elsie.wahlig@amd.com Platform Software Architect Outline What is Virtualization? Evolution of Virtualization AMD Virtualization AMD s IO Virtualization

More information

evm Virtualization Platform for Windows

evm Virtualization Platform for Windows B A C K G R O U N D E R evm Virtualization Platform for Windows Host your Embedded OS and Windows on a Single Hardware Platform using Intel Virtualization Technology April, 2008 TenAsys Corporation 1400

More information

Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM

Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM Bern University of Applied Sciences Engineering and Information Technology Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM By Franz Meyer Version 1.0 February 2011 Virtualization Architecture

More information

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions AMD DAS (DASH, AMD Virtualization (AMD-V ) Technology, and Security) 1.0 is a term used to describe the various

More information

A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing

A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing Stefan Berger Joint work with: Kenneth Goldman, Dimitrios Pendarakis, David Safford, Mimi Zohar IBM T.J. Watson Research Center 09/21/2011

More information

The Microsoft Windows Hypervisor High Level Architecture

The Microsoft Windows Hypervisor High Level Architecture The Microsoft Windows Hypervisor High Level Architecture September 21, 2007 Abstract The Microsoft Windows hypervisor brings new virtualization capabilities to the Windows Server operating system. Its

More information

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines: Virtual Machines Uses for Virtual Machines Virtual machine technology, often just called virtualization, makes one computer behave as several computers by sharing the resources of a single computer between

More information

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced

More information

Chapter 2 Addendum (More on Virtualization)

Chapter 2 Addendum (More on Virtualization) Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)

More information

Virtualization and the U2 Databases

Virtualization and the U2 Databases Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the

More information

Satish Mohan. Head Engineering. AMD Developer Conference, Bangalore

Satish Mohan. Head Engineering. AMD Developer Conference, Bangalore Satish Mohan Head Engineering AMD Developer Conference, Bangalore Open source software Allows developers worldwide to collaborate and benefit. Strategic elimination of vendor lock in OSS naturally creates

More information

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation BitLocker Drive Encryption Hardware Enhanced Data Protection Shon Eizenhoefer, Program Manager Microsoft Corporation Agenda Security Background BitLocker Drive Encryption TPM Overview Building a BitLocker

More information

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey

More information

Virtualization Overview

Virtualization Overview VMWARE W HWHITE I T E PPAPER A P E R Virtualization Overview 1 Table of Contents Introduction... 3 Virtualization in a Nutshell... 3 Virtualization Approaches... 4 Virtualization for Server Consolidation

More information

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity

More information

Virtualization System Security

Virtualization System Security Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability

More information

Red Hat VDI. David Simmons

Red Hat VDI. David Simmons Red Hat VDI David Simmons Senior Architect, Red Hat Virtualization AGENDA Open Source and the Evolution of Virtualization Desktop VDI Value Components Real VDI TCO The Future of the Desktop and the savings

More information

Professional Xen Visualization

Professional Xen Visualization Professional Xen Visualization William von Hagen WILEY Wiley Publishing, Inc. Acknowledgments Introduction ix xix Chapter 1: Overview of Virtualization : 1 What Is Virtualization? 2 Application Virtualization

More information

Virtualization: an old concept in a new approach

Virtualization: an old concept in a new approach MPRA Munich Personal RePEc Archive Virtualization: an old concept in a new approach Logica Banica and Doina Rosca and Cristian Stefan University of Pitesti, Faculty of Economics, University of Craiova,

More information

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines

Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Basics in Energy Information (& Communication) Systems Virtualization / Virtual Machines Dr. Johann Pohany, Virtualization Virtualization deals with extending or replacing an existing interface so as to

More information

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances Introduction............................................................ 2 What is Virtualization?....................................................2

More information

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................

More information

Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition

Chapter 16: Virtual Machines. Operating System Concepts 9 th Edition Chapter 16: Virtual Machines Silberschatz, Galvin and Gagne 2013 Chapter 16: Virtual Machines Overview History Benefits and Features Building Blocks Types of Virtual Machines and Their Implementations

More information

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology Reduce I/O cost and power by 40 50% Reduce I/O real estate needs in blade servers through consolidation Maintain

More information

vtpm: Virtualizing the Trusted Platform Module

vtpm: Virtualizing the Trusted Platform Module vtpm: Virtualizing the Trusted Platform Module Stefan Berger Ramón Cáceres Kenneth A. Goldman Ronald Perez Reiner Sailer Leendert van Doorn {stefanb, caceres, kgoldman, ronpz, sailer, leendert}@us.ibm.com

More information

WHITE PAPER Mainstreaming Server Virtualization: The Intel Approach

WHITE PAPER Mainstreaming Server Virtualization: The Intel Approach WHITE PAPER Mainstreaming Server Virtualization: The Intel Approach Sponsored by: Intel John Humphreys June 2006 Tim Grieser IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200

More information

How To Make A Minecraft Iommus Work On A Linux Kernel (Virtual) With A Virtual Machine (Virtual Machine) And A Powerpoint (Virtual Powerpoint) (Virtual Memory) (Iommu) (Vm) (

How To Make A Minecraft Iommus Work On A Linux Kernel (Virtual) With A Virtual Machine (Virtual Machine) And A Powerpoint (Virtual Powerpoint) (Virtual Memory) (Iommu) (Vm) ( Operating System and Hypervisor Support for IOMMUs Muli Ben-Yehuda IBM Haifa Research Lab muli@il.ibm.com p. 1/3 Table of Contents The what and why of IOMMUs. How much does it cost? What can we do about

More information

Basic Computer Skills Module 2. Software Concepts

Basic Computer Skills Module 2. Software Concepts Basic Computer Skills Module 2 Software Concepts Basic Computer Skills Module 2 Software Basics Summary Goal: Know the fundamentals of operating systems. SMART Objectives: Specific, Measurable, Achievable,

More information

Models For Modeling and Measuring the Performance of a Xen Virtual Server

Models For Modeling and Measuring the Performance of a Xen Virtual Server Measuring and Modeling the Performance of the Xen VMM Jie Lu, Lev Makhlis, Jianjiun Chen BMC Software Inc. Waltham, MA 2451 Server virtualization technology provides an alternative for server consolidation

More information

Virtualization for Cloud Computing

Virtualization for Cloud Computing Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources

More information

Lecture Overview. INF3510 Information Security Spring 2015. Lecture 4 Computer Security. Meaningless transport defences when endpoints are insecure

Lecture Overview. INF3510 Information Security Spring 2015. Lecture 4 Computer Security. Meaningless transport defences when endpoints are insecure Lecture Overview INF3510 Information Security Spring 2015 Fundamental computer security concepts CPU and OS kernel security mechanisms Virtualization Memory Protection Trusted computing and TPM Lecture

More information

Basics of Virtualisation

Basics of Virtualisation Basics of Virtualisation Volker Büge Institut für Experimentelle Kernphysik Universität Karlsruhe Die Kooperation von The x86 Architecture Why do we need virtualisation? x86 based operating systems are

More information

Virtualization. Pradipta De pradipta.de@sunykorea.ac.kr

Virtualization. Pradipta De pradipta.de@sunykorea.ac.kr Virtualization Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation

More information

Security Overview of the Integrity Virtual Machines Architecture

Security Overview of the Integrity Virtual Machines Architecture Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling

More information

Property Based TPM Virtualization

Property Based TPM Virtualization Property Based Virtualization Marcel Winandy Joint work with: Ahmad Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security Chair for System Security Ruhr University Bochum, Germany Sirrix

More information

Broadcom Ethernet Network Controller Enhanced Virtualization Functionality

Broadcom Ethernet Network Controller Enhanced Virtualization Functionality White Paper Broadcom Ethernet Network Controller Enhanced Virtualization Functionality Advancements in VMware virtualization technology coupled with the increasing processing capability of hardware platforms

More information

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the

More information

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed

More information

Introduction to Virtual Machines

Introduction to Virtual Machines Introduction to Virtual Machines Carl Waldspurger (SB SM 89, PhD 95), VMware R&D 2010 VMware Inc. All rights reserved Overview Virtualization and VMs Processor Virtualization Memory Virtualization I/O

More information

Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361

Virtual Machines. COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 s COMP 3361: Operating Systems I Winter 2015 http://www.cs.du.edu/3361 1 Virtualization! Create illusion of multiple machines on the same physical hardware! Single computer hosts multiple virtual machines

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

SUSE Linux Enterprise 10 SP2: Virtualization Technology Support

SUSE Linux Enterprise 10 SP2: Virtualization Technology Support Technical White Paper LINUX OPERATING SYSTEMS www.novell.com SUSE Linux Enterprise 10 SP2: Virtualization Technology Support Content and modifications. The contents of this document are not part of the

More information

International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763

International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763 International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 VIRTUALIZATION Vikas Garg Abstract: The main aim of the research was to get the knowledge of present trends

More information

How bare-metal client hypervisors will mean the end of agent-based Windows management

How bare-metal client hypervisors will mean the end of agent-based Windows management How bare-metal client hypervisors will mean the end of agent-based Windows management Abstract... 2 Understanding the old (current?) way of managing desktops.... 2 How do companies manage desktops currently?...

More information

Enterprise-Class Virtualization with Open Source Technologies

Enterprise-Class Virtualization with Open Source Technologies Enterprise-Class Virtualization with Open Source Technologies Alex Vasilevsky CTO & Founder Virtual Iron Software June 14, 2006 Virtualization Overview Traditional x86 Architecture Each server runs single

More information

A Survey on Virtual Machine Security

A Survey on Virtual Machine Security A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology jreubens@cc.hut.fi Abstract Virtualization plays a major role in helping the organizations to reduce the operational

More information

The QEMU/KVM Hypervisor

The QEMU/KVM Hypervisor The /KVM Hypervisor Understanding what's powering your virtual machine Dr. David Alan Gilbert dgilbert@redhat.com 2015-10-14 Topics Hypervisors and where /KVM sits Components of a virtual machine KVM Devices:

More information

Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...

Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization... Contents Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...3 The Challenges of x86 Hardware Virtualization...3 Technique 1 - Full Virtualization using Binary Translation...4 Technique

More information

Software Execution Protection in the Cloud

Software Execution Protection in the Cloud Software Execution Protection in the Cloud Miguel Correia 1st European Workshop on Dependable Cloud Computing Sibiu, Romania, May 8 th 2012 Motivation clouds fail 2 1 Motivation accidental arbitrary faults

More information

Virtual Machines. www.viplavkambli.com

Virtual Machines. www.viplavkambli.com 1 Virtual Machines A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software

More information

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is 1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the

More information

Technical Brief Distributed Trusted Computing

Technical Brief Distributed Trusted Computing Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,

More information

Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V. Technical Brief v1.

Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V. Technical Brief v1. Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V Technical Brief v1.0 September 2012 2 Intel Ethernet and Configuring SR-IOV on Windows*

More information

Overview of Windows 10 Requirements for TPM, HVCI and SecureBoot

Overview of Windows 10 Requirements for TPM, HVCI and SecureBoot presented by Overview of Windows 10 Requirements for TPM, HVCI and SecureBoot UEFI Spring Plugfest May 18-22, 2015 Gabe Stocco, Scott Anderson, Suhas Manangi Updated 2011-06-01 UEFI Plugfest May 2015 www.uefi.org

More information

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer kklemperer@blackboard.com Agenda Session Length:

More information

On the security of Virtual Machine migration and related topics

On the security of Virtual Machine migration and related topics Master thesis On the security of Virtual Machine migration and related topics Ramya Jayaram Masti Submitted in fulfillment of the requirements of Master of Science in Computer Science Department of Computer

More information

Operating System Structures

Operating System Structures COP 4610: Introduction to Operating Systems (Spring 2015) Operating System Structures Zhi Wang Florida State University Content Operating system services User interface System calls System programs Operating

More information

VMware Server 2.0 Essentials. Virtualization Deployment and Management

VMware Server 2.0 Essentials. Virtualization Deployment and Management VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.

More information

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients

More information

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015 Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is

More information

Imaging Computing Server User Guide

Imaging Computing Server User Guide Imaging Computing Server User Guide PerkinElmer, Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44 (0) 24 7669 0091 E cellularimaging@perkinelmer.com

More information

Chapter 5 Cloud Resource Virtualization

Chapter 5 Cloud Resource Virtualization Chapter 5 Cloud Resource Virtualization Contents Virtualization. Layering and virtualization. Virtual machine monitor. Virtual machine. Performance and security isolation. Architectural support for virtualization.

More information

The Art of Virtualization with Free Software

The Art of Virtualization with Free Software Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike

More information

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,

More information

Virtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/

Virtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ Virtualization Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ What is Virtualization? Virtualization is the simulation of the software and/ or hardware upon which other software runs. This

More information

Virtualization Technology

Virtualization Technology Virtualization Technology A Manifold Arms Race Michael H. Warfield Senior Researcher and Analyst mhw@linux.vnet.ibm.com 2008 IBM Corporation Food for Thought Is Virtual Reality an oxymoron or is it the

More information

HW (Fat001) TPM. Figure 1. Computing Node

HW (Fat001) TPM. Figure 1. Computing Node 1. Overview Two major components exist in our current prototype systems: the management node, including the Cloud Controller, Cluster Controller, Walrus and EBS, and the computing node, i.e. the Node Controller

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...

More information

Getting More Performance and Efficiency in the Application Delivery Network

Getting More Performance and Efficiency in the Application Delivery Network SOLUTION BRIEF Intel Xeon Processor E5-2600 v2 Product Family Intel Solid-State Drives (Intel SSD) F5* Networks Delivery Controllers (ADCs) Networking and Communications Getting More Performance and Efficiency

More information

Review from last time. CS 537 Lecture 3 OS Structure. OS structure. What you should learn from this lecture

Review from last time. CS 537 Lecture 3 OS Structure. OS structure. What you should learn from this lecture Review from last time CS 537 Lecture 3 OS Structure What HW structures are used by the OS? What is a system call? Michael Swift Remzi Arpaci-Dussea, Michael Swift 1 Remzi Arpaci-Dussea, Michael Swift 2

More information

Attacking Hypervisors via Firmware and Hardware

Attacking Hypervisors via Firmware and Hardware Attacking Hypervisors via Firmware and Hardware Alex Matrosov (@matrosov), Mikhail Gorobets, Oleksandr Bazhaniuk (@ABazhaniuk), Andrew Furtak, Yuriy Bulygin (@c7zero) Advanced Threat Research Agenda Hypervisor

More information

Trustworthy Computing

Trustworthy Computing Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with

More information

SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes!

SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes! SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes! Kun Sun, Jiang Wang, Fengwei Zhang, Angelos Stavrou! Center for Secure Information Systems! George Mason University!

More information

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR ANKIT KUMAR, SAVITA SHIWANI 1 M. Tech Scholar, Software Engineering, Suresh Gyan Vihar University, Rajasthan, India, Email:

More information